Did you know that the United Nations intends to have biometric identification cards in the hands of every single man, woman and child on the entire planet by the year 2030? And did you know that a central database in Geneva, Switzerland will be collecting data from many of these cards? Previously, I have written about the 17 new “Global Goals” that the UN launched at the end of September. Even after writing several articles about these new Global Goals, I still don’t think that most of my readers really grasp how insidious they actually are. This new agenda truly is a template for a “New World Order”, and if you dig into the sub-points for these new Global Goals you find some very alarming things.

The United Nations is already working hard toward the implementation of this goal – particularly among refugee populations. The UN has partnered with Accenture to implement a biometric identification system that reports information “back to a central database in Geneva”. The following is an excerpt from an article that was posted on findbiometrics.com…

The United Nations High Commissioner for Refugees (UNHCR) is moving forward with its plans to use biometrictechnology to identify and track refugees, and has selected a vendor for the project. Accenture, an international technology services provider, has won out in the competitive tendering process and will oversee the implementation of the technology in a three-year contract.

The UNHCR will use Accenture’s Biometric Identity Management System (BIMS) for the endeavor. BIMS can be used to collect facial, iris, and fingerprint biometric data, and will also be used to provide many refugees with their only form of official documentation. The system will work in conjunction with Accenture’s Unique Identity Service Platform(UISP) to send this information back to a central database in Geneva, allowing UNHCR offices all over the world to effectively coordinate with the central UNHCR authority in tracking refugees.

I don’t know about you, but that sure does sound creepy to me.

And these new biometric identification cards will not just be for refugees. According to a different FindBiometrics report, authorities hope this technology will enable them to achieve the UN’s goal of having this kind of identification in the hands of every man, woman and child on the planet by the year 2030…

A report synopsis notes that about 1.8 billion adults around the world currently lack any kind of official documentation. That can exclude those individuals from access to essential services, and can also cause serious difficulties when it comes to trans-border identification.

That problem is one that Accenture has been tackling in collaboration with the United Nations High Commissioner for Refugees, which has been issuing Accenture-developed biometric identity cards to populations of displaced persons in refugee camps in Thailand, South Sudan, and elsewhere. The ID cards are important for helping to ensure that refugees can have access to services, and for keeping track of refugee populations.

Moreover, the nature of the deployments has required an economically feasible solution, and has demonstrated that reliable, biometric ID cards can affordably be used on a large scale. It offers hope for the UN’s Sustainable Development Goalof getting legal ID into the hands of everyone in the world by the year 2030 with its Identification for Development (ID4D) initiative.

The Identification for Development (ID4D) initiative was originally launched by the World Bank, and they are proud to be working side by side with the UN to get “legal identity” into the hands of all. The following comes from the official website of the World Bank…

Providing legal identity for all (including birth registration) by 2030 is a target shared by the international community as part of the Sustainable Development Goals (target 16.9). The World Bank Group (WBG) has launched the Identification for Development (ID4D) cross-practice initiative, with the participation of seven GP/CCSAs sharing the same vision and strategic objectives, to help our client countries achieve this goal and with the vision of making everyone count: ensure a unique legal identity and enable digital ID-based services to all.

Of course all of this is being framed as a “humanitarian” venture right now, but will it always stay that way?

At some point will a universal biometric ID be required for everyone, including you and your family?

And what would happen if you refused to take it?

I could definitely foresee a day when not having “legal identification” would disqualify you from holding a job, getting a new bank account, applying for a credit card, qualifying for a mortgage, receiving any form of government payments, etc. etc.

At that point, anyone that refused to take a “universal ID” would become an outcast from society.

What the elite want to do is to make sure that everyone is “in the system”. And it is a system that they control and that they manipulate for their own purposes. That is one of the reasons why they are slowly but surely discouraging the use of cash all over the world.

The Swedish government abetted by its fractional-reserve banking system is moving relentlessly toward a completely cashless economy. Swedish banks have begun removing ATMs even in remote rural areas, and according to Credit Suisse the rule of thumb in Scandinavia is “If you have to pay in cash, something is wrong.” Since 2009 the average annual value of notes and coins in circulation in Sweden has fallen more than 20 percent from over 100 billion to 80 billion kronor. What is driving this movement to destroy cash is the desire to unleash the Swedish central bank to drive the interest rate down even further into negative territory. Currently, it stands at -0.35 percent, but the banks have not passed this along to their depositors, because depositors would simply withdraw their cash rather than leave it in banks and watch its amount shrink inexorably toward zero. However, if cash were abolished and bank deposits were the only form of money, well then there would be no limit on negative interest rate policy as banks would be able to pass these negative interest rates onto their depositors without adverse consequences. With everyone’s wages, salaries, dividends etc, paid by direct deposit into his bank account, the only way to escape negative interest rates would be to spend, spend, spend. This, of course, is precisely what the Keynesian economists advising governments and running central banks are aiming at….a pro-cash resistance movement is beginning to coalesce and the head of a security industry lobbying group relates, “I’ve heard of people keeping cash in their microwaves because banks won’t accept it.”

If you aren’t using cash, that means that all of your economic activity is going through the banks where it can be watched, tracked, monitored and regulated.

Every time the elite propose something for our “good”, it somehow always results in them having more power and more control.

I hope that people will wake up and see what is happening. Major moves towarda one world system are taking place right in front of our eyes, and yet I hear very, very few people talking about any of this.

From his first days as commander in chief, the drone has been President Barack Obama’s weapon of choice, used by the military and the CIA to hunt down and kill the people his administration has deemed — through secretive processes, without indictment or trial — worthy of execution. There has been intense focus on the technology of remote killing, but that often serves as a surrogate for what should be a broader examination of the state’s power over life and death.

Drones are tool not a policy. The policy is assassination. While every president since Gerald Ford has upheld an executive order banning assassinations by U.S. personnel, Congress has avoided legislating the issue or even defining the word “assassination.” This has allowed proponents of the drone wars to rebrand assassinations with more palatable characterizations, such as the term du jour, “targeted killings.”

When the Obama administration has discussed drone strikes publicly, it has offered assurances that such operations are a more precise alternative to boots on the ground and are authorized only when an “imminent” threat is present and there is “near certainty” that the intended target will be eliminated. Those terms, however, appear to have been bluntly redefined to bear almost no resemblance to their commonly understood meanings.

The first drone strike outside of a declared war zone was conducted more than 12 years ago, yet it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. Those guidelines offered little specificity, asserting that the U.S. would only conduct a lethal strike outside of an “area of active hostilities” if a target represents a “continuing, imminent threat to U.S. persons,” without providing any sense of the internal process used to determine whether a suspect should be killed without being indicted or tried. The implicit message on drone strikes from the Obama administration has been one of trust, but don’t verify.

The Intercept has obtained a cache of secret slides that provides a window into the inner workings of the U.S. military’s kill/capture operations at a key time in the evolution of the drone wars — between 2011 and 2013. The documents, which also outline the internal views of special operations forces on the shortcomings and flaws of the drone program, were provided by a source within the intelligence community who worked on the types of operations and programs described in the slides. The Intercept granted the source’s request for anonymity because the materials are classified and because the U.S. government has engaged in aggressive prosecution of whistleblowers. The stories in this series will refer to the source as “the source.”

The source said he decided to provide these documents to The Intercept because he believes the public has a right to understand the process by which people are placed on kill lists and ultimately assassinated on orders from the highest echelons of the U.S. government. “This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong,” the source said.

“We’re allowing this to happen. And by ‘we,’ I mean every American citizen who has access to this information now, but continues to do nothing about it.”

The Pentagon, White House, and Special Operations Command all declined to comment. A Defense Department spokesperson said, “We don’t comment on the details of classified reports.”

The CIA and the U.S. military’s Joint Special Operations Command (JSOC) operate parallel drone-based assassination programs, and the secret documents should be viewed in the context of an intense internal turf war over which entity should have supremacy in those operations. Two sets of slides focus on the military’s high-value targeting campaign in Somalia and Yemen as it existed between 2011 and 2013, specifically the operations of a secretive unit, Task Force 48-4.

Additional documentson high-value kill/capture operations in Afghanistan buttress previous accounts of how the Obama administration masks the true number of civilians killed in drone strikes by categorizing unidentified people killed in a strike as enemies, even if they were not the intended targets. The slides also paint a picture of a campaign in Afghanistan aimed not only at eliminating al Qaeda and Taliban operatives, but also at taking out members of other local armed groups.

One top-secret document shows how the terror “watchlist” appears in the terminals of personnel conducting drone operations, linking unique codes associated with cellphone SIM cards and handsets to specific individuals in order to geolocate them.

A top-secret document shows how the watchlist looks on internal systems used by drone operators. Click to enlarge

The costs to intelligence gathering when suspected terrorists are killed rather than captured are outlined in the slides pertaining to Yemen and Somalia, which are part of a 2013 study conducted by a Pentagon entity, the Intelligence, Surveillance, and Reconnaissance Task Force. The ISR study lamented the limitations of the drone program, arguing for more advanced drones and other surveillance aircraft and the expanded use of naval vessels to extend the reach of surveillance operations necessary for targeted strikes. It also contemplated the establishment of new “politically challenging” airfields and recommended capturing and interrogating more suspected terrorists rather than killing them in drone strikes.

The ISR Task Force at the time was under the control of Michael Vickers, the undersecretary of defense for intelligence. Vickers, a fierce proponent of drone strikes and a legendary paramilitary figure, had long pushed for a significant increase in the military’s use of special operations forces. The ISR Task Force is viewed by key lawmakers as an advocate for more surveillance platforms like drones.

The ISR study also reveals new details about the case of a British citizen, Bilal el-Berjawi, who was stripped of his citizenship before being killed in a U.S. drone strike in 2012. British and American intelligence had Berjawi under surveillance for several years as he traveled back and forth between the U.K. and East Africa, yet did not capture him. Instead, the U.S. hunted him down and killed him in Somalia.

Taken together, the secret documents lead to the conclusion that Washington’s 14-year high-value targeting campaign suffers from an overreliance on signals intelligence, an apparently incalculable civilian toll, and — due to a preference for assassination rather than capture — an inability to extract potentially valuable intelligence from terror suspects. They also highlight the futility of the war in Afghanistan by showing how the U.S. has poured vast resources into killing local insurgents, in the process exacerbating the very threat the U.S. is seeking to confront.

These secret slides help provide historical context to Washington’s ongoing wars, and are especially relevant today as the U.S. military intensifies its drone strikes and covert actions against ISIS in Syria and Iraq. Those campaigns, like the ones detailed in these documents, are unconventional wars that employ special operations forces at the tip of the spear.

The “find, fix, finish” doctrine that has fueled America’s post-9/11 borderless war is being refined and institutionalized. Whether through the use of drones, night raids, or new platforms yet to be unleashed, these documents lay bare the normalization of assassination as a central component of U.S. counterterrorism policy.

“The military is easily capable of adapting to change, but they don’t like to stop anything they feel is making their lives easier, or is to their benefit. And this certainly is, in their eyes, a very quick, clean way of doing things. It’s a very slick, efficient way to conduct the war, without having to have the massive ground invasion mistakes of Iraq and Afghanistan,” the source said. “But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it’s going to become harder and harder to pull them away from it the longer they’re allowed to continue operating in this way.”

Since 7/7 happened more than ten-years-ago, only one person has been killed in the UK by “Islamic terror” in the intervening decade. As Craig Murray points out below, that was Lee Rigby and as we’ve highlighted elsewhere, that whole incident looks highly suspect.

The former British Ambassador to Uzbekistan from August 2002 to October 2004 and Rector of the University of Dundee from 2007 to 2010 offers his assessment of the threat posed by Muslim extremists. His appraisal is blunt and to the point but a whole lot more convincing than that of Andre Parker, the current head of MI5. Ed.

Andrew Parker the current head of M15

3,000 domestic extremists plotting to attack Britain – MI5 chief

Russia Today — Sept 18, 2015

MI5 and counter-terror officers are screening more than 3,000 domestic Islamic extremists willing to conduct attacks in the UK as the government prepares to introduce sweeping new snooping powers.

British men and women, some of whom are in their teens, are being radicalized in a matter of weeks, security sources told the Times on Thursday.

The threat of domestic terror attacks was revealed after Andrew Parker became the first MI5 director-general in the agency’s history to offer a live interview to a broadcaster.

Intelligence officials foiled six plots in the past 12 months alone, he told BBC Radio 4 on Thursday, calling on internet firms to assist UK authorities in their fight against terrorism.

Total Bollocks From MI5

In the last decade, now 7/7 has dropped out of this statistic, only one person has been killed in the UK by an Islamic terrorist attack. Let me repeat that. In the last decade, one person has been killed in the UK by an Islamic terrorist attack. That unfortunate death was Lee Rigby.

Rigby’s tragic murder illustrated how easy it is for terrorists to commit an outrage. Two very disorganised Nigerian nutters murdered him with knives. Unfortunately, if a couple of nutters decide to go at someone on the street, they have a high chance of success.

Which is why you would have to be a lunatic actually to believe MI5’s repeated claims during the last decade that there are thousands of dedicated terrorists out there, fanatical determined and organised, but in a decade of constant effort they have succeeded in killing nobody else. There were, MI5 claim, six actual terrorist plots this year but fortunately MI5 saved all of us.

The alleged murderer of drummer Lee Rigby in the Woolwich psyop, Michael Adebolajo. Click to enlarge

If you believe MI5’s stories, there are two possibilities. The first is that we have security services of a quite incredible efficiency, able to foil random terrorism, generally regarded as near impossible. The second is that we have thousands of dedicated terrorists of such incredible ineptitude that they can’t manage to kill anybody, even when they could choose any random undefended target in the entire UK and any method from knives to poison to hit and run to shooting to bombs, and don’t mind losing their own lives in the attempt. We have rubbish terrorists.

There is of course a third possibility – that these thousands of dedicated terrorists and these scores of foiled plots in the last decade were inventions, or at least the grossest exaggerations, by the security services. A number of fantasists have indeed been convicted and jailed. But the only, single, potential attacker in recent years who actually possessed a viable bomb was a British army soldier with a hatred of Muslims. And naturally he was not counted as nor convicted as a terrorist. Terrorists are Muslims.

The famous “liquid bomb plot”, in which it eventually transpired, unreported by mainstream media, that there were in fact no bombs and no plane tickets and the suspicious chemical found in baby bottles was Milton sterilising solution for baby bottles, is perhaps the best example.

But of course, lots of people are convicted of terrorism. Indeed law after law has stretched the definition of terrorism so far that I am almost certainly guilty of it just by publishing this blogpost. Meanwhile the Government is concentrating on bullying universities and students to ban speakers who say exactly the kind of thing I am writing here, speakers who protest against the detention and harassment of Muslims, and the continued policy of bombing Muslim countries and killing civilians.

Because there is almost no Islamic terrorism in the UK. It is virtually non-existent. It is not the true reason the corporate state wants ever more surveillance power, ever more restriction on freedom of speech and even, in universities, freedom of thought. Do not be fooled. Fight back.

Craig Murray is an author, broadcaster and human rights activist. He was British Ambassador to Uzbekistan from August 2002 to October 2004 and Rector of the University of Dundee from 2007 to 2010.

Debased humanity’s growing fascination with transforming the natural human appearance into the likeness of demonic entities is gaining traction through a movement known as “transhumanism,” or the blending of humans and machines, which is reportedly gaining popularity within some subcultures.

Piercings and tattoos are now old news for these folks, who are increasingly opting for the literal injection of things like silicone “devil horns,” internal metallic objects and even radio frequency identification chips directly into their bodies. And while they claim that doing so will help humanity, the concept reeks of the “mark of the beast” scenario warned about in the Bible.

The photo below shows the owner of a Denmark-based company known as “Copenhagen Body Extremes,” who is seen holding a skull, making a devil-worship gesture with his hands and proudly displaying devil horns on his head. Muffe Vulnuz, according to World Crunch, is one of the ringleaders of this disturbing bodily mutilation trend.

Vulnuz, who is admittedly obsessed with bodily mutilation, says he’s already microchipped himself and some 300 others as part of a movement to create hybrid human-machines, all in the name of open-source technology advancement.

Here you can see Vulnuz doing work on a customer’s arms, possibly injecting one of his popular microchips into it:

Transhumanism is the gateway towards a cashless, one-world global control system

The point of the microchips, he says, is to supposedly help simplify people’s lives and allow them to potentially not have to carry around various forms of identification, cash and credit cards in the future. With a microchip, he says, Vulnuz and his followers are “pioneering” an effort to create what one of his supporters describes as “connected bodies.””We carry with us loads of personal objects — bank cards, driving licences, library cards, house keys, office keys, car keys, which have no other goal than to identify us,” said Hannes Sjoblad, a Seattle native and the organizer of a recent “implant party” that took place at Vulnuz’ shop.”Eventually, we’ll be able to get rid of all that and to replace them all with one unique digital identification.”In other words, Vulnuz, Sjoblad and various others are right now benchmarking the push towards a cashless society in which every human being will be expected to prove who they are, make purchases and engage socially using injected RFID microchips, without which it will eventually be difficult, if not impossible, to survive.“For now, there are only a handful of possible uses,” said Hannes. “But the more people adopt chips, the more companies and public institutions will be encouraged to develop new features.”

Satanists now injecting RFID chips into people’s hands throughout Europe and North America

And the movement isn’t just isolated to Denmark — according to Vulnuz, thousands of his microchips are being shipped to the U.S. and various locales throughout Europe, including in the Netherlands, Sweden, Finland, Belgium and France.

“These implants will be like our internal organs,” purports Hannes, ominously, “our kidneys, our livers, and they’ll [fulfill] their purpose without us even thinking about it.”

The image below depicts the spot on a individual’s arm where an RFID microchip was injected:

And here’s the mutilated face of another bodily mutilation customer who appears to have had implants injected into his forehead as well as designs branded onto his cheeks:

The cult of “science” has a fetish for trying to amalgamate humanity with machine. And its latest endeavor in this pursuit has taken the form of an emerging brain implant technology that would render humans part flesh, part computer.

Researchers from the University of California, Berkeley (UCB), have come up with a concept they’ve dubbed “neural dust” that they say can be implanted into people’s brains for data collection purposes. And the technology is reportedly so small that humans wouldn’t even know it was inside their heads.

Using a special wire apparatus, the neural dust can be “dipped” into a person’s cerebral cortex, report scientists, where it would remain embedded indefinitely. And since it’s powered by special piezoelectric materials, this dust wouldn’t require a recharge, which means once it’s there, it’s there for good.

According to reports, this neural dust contains a complementary metal oxide semiconductor (CMOS) that allows it to monitor and track a person’s brain activity. After gathering this data, the dust then transmits it to a special transmitter installed on a person’s scalp.

Here’s how The Wall Street Journal (WSJ) describes the technology:

“Thousands of biologically neutral microsensors, on the order of one-tenth of a millimeter (approximately the thickness of a human hair), would convert electrical signals into ultrasound that could be read outside the brain.”

So what’s the purpose of such invasive technology? The team that came up with the idea claims neural dust could be used to treat chronic diseases and “severe disabilities” with greater ease. This is often the excuse linked to human-machine alchemy projects — it’s to help people!

On the flip side, microscopic cranialimplants offer a way for nefarious entities to literally enter the minds of humans, perhaps undetected, and track their thoughts and behaviors. This is a much more likely scenario — a type of “Mark of the Beast” for one’s brain that could even allow governments to control people’s minds.

Before relegating all this to the conspiracy theory dustbin, consider the fact that the American military has openly admitted to funding brain-computer projects capable of controlling people’s thoughts and emotions. And none other than Jose Carmena, a professor from UCB, who also worked on the neural dust project, helped lead the project.

To the tune of $70 million, the U.S. military funded research into implantable electrodes that could be installed into people’s brains to both read and control their emotions. And once again, the reasoning was to help “mentally ill people” recover from their demons and addictions.

“Imagine if I have an addiction to alcohol and I have a craving,” stated Carmena to MIT Technology Review. “We could detect that feeling and then stimulate inside the brain to stop it from happening.”

Obama’s “BRAIN Initiative” pushes government mind-control agenda

Both projects fall in line with the Obama regime’s “BRAIN Initiative,” a so-called “brain-mapping” program being actively funded by the National Institutes of Health (NIH), the National Science Foundation (NSF) and the Defense Advanced Research Projects Agency (DARPA). The program is being branded as a “support” system for injured veterans and war fighters, but others recognize it as an attempt at totalitarian mind-control.

“Our generation has outlived science fiction,” wrote New York Times (NYT) columnist William Safire back in 2002, warning even back then about the dangers of this emerging technology.

“Just as we have anti-depressants today to elevate mood, tomorrow we can expect a kind of Botox for the brain to smooth out wrinkled temperaments, to turn shy people into extroverts, or to bestow a sense of humor on a born grouch. But what price will human nature pay for these nonhuman artifices? What does the flattening of people’s physical and mental differences, accompanied by a forced fitting of mental misfits, do to the diversity of personality that makes interpersonal dynamics so fascinating?”

Martin Hill — The Rebel.org Aug 5, 2013

Hundreds of thousands of young and old alternative music fans have lined up and willingly received RFID micro-chipped non-removable wristbands to gain entrance to the Lollapalooza music festival in Chicago’s Grant Park, which began Friday August 2nd.

On their website, festival organizers put a positive spin on the RFID tags, explaining “We’re saving paper and saving you the hassle of redeeming a paper ticket for your wristband! All wristbands will be mailed to you either by USPS or transferable UPS.”

Fans were warned that if they remove the wristbands for any portion of the three day event, they are invalidated and can not be re-used. No refunds or replacements are given. The event warns of their “crack security” team and an infamous “trouble” table if any anomalies are noticed in a wristband, which “will be confiscated” if they appear “messed with.”

The Lollapalooza website confirmed the use of RFID:

Wondering If Your Pass Is Real?
All three-day, single day, and VIP Passes to Lollapalooza 2013 are sold-out. All wristbands contain RFID technology and will be authenticated upon entering the gates. Lollapalooza organizers do not condone purchasing passes from secondary markets, and ask fans to beware of purchasing counterfeit wristbands. Passes purchased from any source besides Lollapalooza.com or Front Gate Tickets will not be honored at the gates.

http://www.lollapalooza.com/tickets/

In addition to mandatory RFID tags, the venue announced that everyone’s bags will be searched: “The safety and security of our fans is our top priority. Please be aware that ALL bags will be searched each time attendees enter the festival grounds. This will require more time during the entry process. We ask all attendees to plan ahead to allow extra time entering the festival. For faster entry, Express Lanes at both the North and Main entrances are available for those not carrying a bag.”

Thelist of prohibiteditems went a step further, explaining that “Guests and their belongings are subject to search upon entry or re-entry. You can help keep the lines moving quickly by leaving large bags at home.”

In addition to the tracker tags and searches, concert-goers were given a laundry list of rules to follow. Organizers warned that they would “refuse admission or to eject any person who fails to comply with the rules of the venue, local, state or federal law or whose conduct is deemed illegal, disorderly, or offensive by Management.” Despite Lollapalooza’s warning that “Persons entering the facility are subject to search for contraband,” Chicago Sun-Times reporter Rummana Hussain wrotethat there were “illegal substances lingering in the air” and that concert goers “occasionally offer to buy” beer for underage music fans.

Hussain, along with reporters Tina Sfondeles and Brandon Wall, posted updates on theevent for the Chicago Sun-Times throughout the day. Hussain posts on twitter as @rummanahussain, and noted among other things that Trojan Condoms were a prominent advertiser at the venue:

Hussain notes that she is a “Criminal Courts Reporter/Metro Editor at the Chicago Sun-Times; I cover 26th and Cal and am often mistaken for the Spanish interpreter.” She is also apparently a practicing Muslim, mentioning the fact that she is fasting for Ramadan.

Tina Sfondeles noted that unlike past years, Lollapalooza now accepts credit cards at the beer tents and added “I must say the end of the night was kind of dull… Not an overwhelming sense of excitement for either of the headliners.” Brandon Wall noted that for a large part of the day, cellphone service was completely disrupted at the concert for all attendees.

In her 2007 article on “The Hierarchy of the Wristband” at Lollapalooza, Sarah Dahnke of chicagoist.com wrote “Aside from the regular, three-day pass wristband for general concert goers, there are at least nine different levels of VIP-type passes, all with barcodes and able to be scanned on a whim in a very Brave New World way.” RFID Journal published story in 2011 outlining Lollapalooza’s plans to implementRFID.

This youtube video from2012 shows a concert-goer recieving his RFID-tagged Lollapalooza wristband in the mail. The instruction sheet states that attendees must
8. Scan your wristband at the scanners and wait for security to waive you through the chute.
9. Treat your wristband like cash – lost, stolen and/or confiscated wristbands will not be replaced! (in bold)
10. Don’t remove your wristband until you leave the festival on Sunday

All wristbands will be mailed, no tickets or PrintPasses will be available this year.
All sales are FINAL – no refunds and no exchanges.
Only wristbands purchased through Front Gate Tickets are valid. If you purchased from an unauthorized source and/or the ticket is counterfeit, you will not be allowed entry.
Wristbands MUST be worn for entry into the Festival.
Wristbands MUST be worn securely on wrist and cannot be slipped on and off.
Wristbands must be scanned upon exit at the gate in order to re-enter that same day, maximum of 5 ins & outs/day.
Wristbands are NON-TRANSFERABLE, NON-EXCHANGEABLE and NON-REPLACEABLE.
Do NOT remove, stretch or tamper with your wristband in any way or you will not be allowed entry.
Subsequent and/or multiple presentations of a counterfeited wristband are VOID and will be seized by Festival security staff.
If your wristband is removed by Festival security/event staff for any reason, it WILL NOT be replaced.
All passholders must pass through security and are subject to bag inspection. Prohibited items will be confiscated by event staff.
The festival takes place rain or shine.
THERE ARE ABSOLUTELY NO EXCEPTIONS TO THIS WRISTBAND POLICY.

Here are some more of their various rules:

Am I allowed to exit and re-enter Lollapalooza?

Yes, wristbands must be scanned upon exit at the gate in order to re-enter that same day, maximum of 5 ins & outs/day.

There’s a really great deal on Craigslist – should I buy a pass from there?

Every year thousands of our loving fans think that buying a wristband via Craigslist, eBay, or any broker site will save them some cash and allow them to access the festival. Unfortunately, many of these are either already used or are counterfeits. Please don’t make us stop you at the gate and send you to the infamous “trouble” table to examine the wristband, notice that it’s not yours, and turn you away, sobbing down Michigan Avenue. It’s unbecoming and although we’d love to just let you in, you didn’t buy it from us and therefore, we cannot validate your story. If you want 100% confidence that you’ll be cool, visit lollapalooza.com/tickets to purchase your passes every single time. Oftentimes people will try to sell their wristbands to others if they cannot attend a certain day. Unfortunately, the removing of a wristband automatically voids it. Our crack security takes great pain in checking every wristband to assure it has not been removed and replaced. You will be caught and you will be escorted directly from the property. Please do not let them tell you that it’s okay while you fork over $200.00 for three days of music – simply visit lollapalooza.com or call 888.512.SHOW to purchase passes.

Can I mess with my wristband?

DO NOT remove your wristband between days. If wristbands are removed or tampered with whatsoever, they are void and will be confiscated. If wristbands are too loose and look like they can be slipped on and off, they will be confiscated.

Perry Farrell, the front man for the rock band ‘Janes Addiction’ and founder of the Lollapalooza Festival, originally intended to hold this August’s festival in Tel Aviv Israel before that plan was cancelled in January.

Farrell’s real name is Peretz Bernstein, and unbeknownst to most fans, he is an ardent Jewish Zionist. He’s raised money for the Israeli Army and in 2009 Bernstein hosted a “Stand with Israel at Ground Zero” fundraiser with Alan Dershowitz. Billed as “a benefit for victims of terror & A solidarity event for Israel,” the event’s announcement noted that “Larry Silverstein is graciously giving us his gleaming skyscraper for the evening which will be held on the 45th floor.”

In the PBS documentary “America Rebuilds”, aired September 2002, Silverstein makes the following statement;
“I remember getting a call from the, er, fire department commander, telling me that they were not sure they were gonna be able to contain the fire, and I said, ‘We’ve had such terrible loss of life, maybe the smartest thing to do is pull it.’ And they made that decision to pull and we watched the building collapse.” [More details here , here and here.]

What’s ironic is that Bernstein/Farrell in the past has consorted with a 9/11 truth advocate, happily posing for photos with a man wearing a ‘9/11 WAS AN INSIDE JOB’ t-shirt, and didn’t bat an eye. Bernstein’s wife also posed for separate pictures featuring the same shirt, which carries what would ordinarily be considered an extremely offensive message to most Zionists.

A Texas high school banned a second-year student from classes after she refused to wear an ID badge containing an RFID chip. The school district uses the tags in order to game the attendance system for better funding.

Students at some schools in the Northside Independent School District, a public school district serving the San Antonio area, have been required to carry student IDs containing RFID chips since the schoolyear began last fall. John Jay High, where Angela Hernandez was enrolled, is one of the schools included in the initiative.

RFID, which stands for radio frequency identification, involves the use of radio and electromagnetic fields to disseminate information for the purposes of tracking and identification.

RFID is commonly used to keep track of livestock. At schools in the Northside Independent district, the chips monitor students’ movements on campus for attendance records, which are tightly linked to the amount of funding public schools receive each year.

After she refused to wear the tracking device, the district told 15-year-old Hernandez in November that she would have to find another school to attend that didn’t use the tags unless she chose to comply with John Jay’s rules.

Hernandez, a strict Christian, sued the district as a result, claiming that the device is the “Mark of the Beast” mentioned in the Revelation of John, an important part of the Bible held to describe the apocalypse.

“It’s obvious that John Jay High School has no interest in putting their students first, which is a sad reflection on our educational system,” said John Whitehead, president of the group that defended Hernandez in court, as quoted by Wired.

A Texas federal judge and a federal appeals court both ruled that the school’s decision had not violated Hernandez’s freedom of religion. That ruling was because the school eventually moved to allow Hernandez to go to class without the tracking device, while still insisting that she wear it. In any case, the district told Hernandez and her family that she would no longer be able to attend John Jay after January 22, when the next semester begins.

As is the case with most public schools in the US, each district’s funding is determined largely as a result of its daily attendance records. Traditionally, teachers take roll calls at the beginning of classes. If the student happens to be late, the school could lose funding because there is no record of his being there.

With the RFID tracking system, school administrators can count a student as being in attendance as long as he or she is somewhere on the school’s campus that day. By this method, the district gets its portion of funding linked to that student.

The U.S. military wants to plant nanosensors in soldiers to monitor health on future battlefields and immediately respond to needs, but a privacy expert warns the step is just one more down the road to computer chips for all.

“It’s never going to happen that the government at gunpoint says, ‘You’re going to have a tracking chip,’” said Katherine Albrecht, who with Liz McIntyre authored “Spychips,” a book that warns of the threat to privacy posed by Radio Frequency Identification.

“It’s always in incremental steps. If you can put a microchip in someone that doesn’t track them … everybody looks and says, ‘Come on,’” she said. “It’ll be interesting seeing where we go.”

According to a report at Mobiledia, the U.S. military’s Defense Advanced Research Projects Agency has confirmed plans to create nanosensors to monitor the health of soldiers on battlefields.

The devices also would report data to doctors. But privacy analysts have expressed concern that the implants could be used not just to monitor health but to keep track of and possibly control people.

DARPA describes the technology on which it is working as “a truly disruptive innovation,” which would diagnose, monitor vital states and “even deliver medicine into the bloodstream.”

According to LiveScience.com, “Solving the problem of sickness could have a huge impact on the number of soldiers ready to fight, because far more have historically died due to illness rather than combat.”

The report suggested that for special forces, “the practical realization of implantable nanosensors capable of monitoring multiple indicators of physiological state could be a truly disruptive innovation.”

Already being researched is the concept of nanosensors diagnosing disease.

DARPA expects to launch a second effort focused on treatment later this year.

Albrecht said the move is another step in the trip down the road of having every person implanted with a chip that might very well monitor health but also other areas of life.

Microchipping, she said, already is “par for the course” for pets in many parts of the nation, and that acceptance will make it easier to require it for people.

She said it was expected that captive audiences, such as prisoners and troops, would be the first subjected to the requirement, which would make it easier for the general populace to accept it as well.

“It’s interesting,” she said. “I’m stunned how this younger generation is OK. They don’t see the problem. … ‘Why wouldn’t everyone want to be tracked?’”

But she said Americans will have to decide to say no to incremental advances, or by the time officials finally roll out the idea of chips for all, whether they want them or not, it will be too late to decide.

“The analogy that I draw is [that of a train], and if I’m in California and I do not want to wind up in New City, every stop brings me closer,” she said. “At some point I have to get off the train.”

Albrecht also has helped develop and launch a new project calledStartPage,which now is handling some 2 million search requests per day.

The benefit of the page is its privacy. The site explains that every time a person uses a typical search program such as Google, “your search data is recorded.”

“Then they store that information in a giant database,” she explains.

As a result, corporate America and the government have access to “a shocking amount of personal information about you, such as your interests, family circumstances, political leanings, medical conditions and more.

It’s official. The biometric cataloging of the human race has begun. India’s intent to record it’s entire nations’ 1.2 billion people by iris and fingerprint scans signals a devious high tech human monitoring and control agenda.

Although no one ever asks for such systems, biometrics will be sold to the populace as cool, sexy, convenient, safe and secure but will eventually prove to be a living hell for everyone on planet earth. Most just don’t know it yet.

— To surveil and identify, sold as to serve and protect

In order to recognize biometrics as the human equivalent of a dairy cow’s ear tag, a brief explanation is in order. One of many current biometrics systems is referred to as “facial recognition” technology.

When someone volunteers to get their drivers’ license or passport, photos are required to have an unobstructed, relaxed, static, straight-on portrait face. The subjects’ photo is then digitized and entered into a computer.

Via biometric software algorithms, the constant inter-relational dimensions are measured, such as height, width, relation of the nose to the eyes, mouth to chin’s end etc.

Facial expressions, such as smiling for instance, alter these ratio calculations and are no longer allowed during photography. Based upon these unique facial landmarks, an identifying number is arrived at, assigned and data based. Biometrics standards are also internationalized.

The physically dangerous full body x-ray scanners used at U.S. airports (now thankfully banned in several countries which initially had them) can peer right through clothing and record and store a 360 degree biometric profile for future use (travelers’ personal ticket and/or passport info is stored in conjunction with their scan.)

Similar existing street level systems can scan anyone’s body as they walk down the sidewalk without their even knowing it. These real time scans can then be compared to existing databases (which a subject previously provided at the airport, as example.)

BUILDING THE DATABASE AND GROOMING THE POPULACE

In February 2008, at a cost of one billion dollars per year, the FBI awarded a ten year contract to Lockheed Martin to develop a giant database of biometric data including fingerprints, iris scans, and DNA, which the FBI refers to as the “Next Generation Identification” (NGI). The goal is to have such personal data from every human being on file.

How perfect it is then that Lockheed Martin also be responsible for both the Canadian and British Census.

Like with any indoctrination form, it’s important to get children friendly with biometrics as early as possible. SONY and Microsoft use facial recognition in their latest Playstation and XBOX. Why not – it’s fun! Many schoolchildren are thumbscanning to get school lunches or take out library books. Childrens’ cartoons abound with biometric references.

Familiarizing society with biometrics is critical to it’s adoption. Through “patient gradualism” (or in similar military terms, “mission creep”), the slow change takes place while minimizing resistance and reaction. Humans are the most adaptable beings on the planet and if perceptions appear natural, we tend to accept them.

PERSONAL STATEMENT

I refuse to submit to a biometrics photo, iris or thumb scan. As a result, I am no longer able to legally drive a car, or get on a commercial airplane (international or domestic), despite 23 years on the road without a single accident or ticket (an insurance company’s actuarial dream), as driver’s licenses and passports now employ this loathsome technology.

You have to ask yourself: ‘what’s your own personal line in the sand’?

Michael Collins was instrumental in gaining Ireland’s’ independence from the British Crown.

He proved an indefatigable adversary who overcame Britain’s’ best not only because of his highly unorthodox (read: CREATIVITY) tactics but also undoubtedly due to the fact that the British authorities had no knowledge of him!

They had no known pictures, profiles or whereabouts of the man. Such un-predictable wildcards terrify monolithic oligopolies. Collins managed to free the Irish, from the back of a bicycle. If alive today, I doubt Collins would have submitted to biometrics either.

I recommend the movie “Michael Collins” with Liam Neeson as an introduction to the man.

We still have the power of choice, for the most part, as to who gets what information about ourselves but the only sure way to secure this information is to never divulge it in the first place. In an information war, databases are the weapon of your foe.

Observe wild animals in nature. They carry no I.D., roam as they please, occupy no database and yet somehow they are able to thrive. They are free.

]]>http://www.thetruthseeker.co.uk/?feed=rss2&p=42149210 outlandish things the ‘scientific’ controllers have in mind for you in the near futurehttp://www.thetruthseeker.co.uk/?p=38359
http://www.thetruthseeker.co.uk/?p=38359#commentsThu, 24 Nov 2011 08:23:30 +0000http://www.thetruthseeker.co.uk/?p=38359Mike Adams – Natural News November 23, 2011

What corporate-driven “science” has in mind for the future of humanity is far different from the dreamy utopian landscape that’s been portrayed by the mainstream media. To hear the corporate-run media tell it, science is always “good” for humanity. Scientific achievements are always called “advances” and not “setbacks,” even though many of them have proven to be disastrous for humanity (atomic bombs, for example, or GMOs).

While pure science is, indeed, a necessary component of any civilization which seeks to expand its understanding of the universe, what we see dominating the landscape today isn’t pure science but corporate-driven “science” that only seeks to accelerate corporate profits, not human understanding. And with that corporate-slanted science comes a whole new era of truly terrifying technologies that we may soon see become reality in our world.

Here, I’ve compiled a list of ten future technologies that might be used to strip away your freedoms and enslave you to the corporate globalist masters, all under the label of “science.”

#1) Organ harvesting from genetically modified, patented pigs

Need a replacement heart or lung? No worries, mate! Monsanto will grow you a new one using a genetically modified, trans-species pig (patent pending) that was raised on GMO animal feed and subjected to organ harvesting while it was still alive in order to keep the organs “fresh.”

Your government-approved, Medicare-funded transplant will be handled by one of the top U.S. hospitals, which are, even today, deeply engaged in black market organ trafficking and illegal transplantations.

#2) “Behavioral vaccines” that rewire your brain to eliminate dissent

Disobedience is a disease! And the “cure” for disobedience (or Oppositional Defiance Disorder, as they call it) will be a new “vaccine” that biologically rewires your brain to make you more socially acceptable to the controllers.

It will be called a “behavioral vaccine” even though, in reality, it’s just a chemical lobotomy. This technology will be a cornerstone of the global police state, which will have no tolerance for independent thinking or critical thought of any kind, especially against the state.

#3) Centralized, remote monitoring of all your health statistics and vital signs by the police state

Think your medical records are really private? Think again: Even now, the U.S. government maintains a secret centralized bank of blood taken from children at birth. In the near future, citizens will be implanted with biometric monitoring chips that relay information back to the government about your pulse, respiration, and the presence of either illegal drugs or legalized pharmaceuticals (which are often the very same chemicals as illegal drugs, just re-branded as a medication).

These chips will be used by the government to enforce people taking their medications. They will also be used to locate and arrest those who smoke a little pot or take addictive substances without a prescription.

But most importantly, these chips will be used to monitor nutritional levels and make sure no one attains a high level of vitamin D, for example, which promotes clear thinking and strong cognitive function (http://www.naturalnews.com/029190_v…). Under scientific dictatorship, the sheeple must be kept in a state of chronic nutritional deficiency in order to be easily controlled. This will all be sold to the public as a way for the government to monitor their “safety” because, the government will claim, “Too much vitamin D can be dangerous!” So they will set the upper safety limits to the lower threshold of cognitive awakening, making sure that everyone remains in a mental stupor as they live out their state-run lives.

#4) The total secrecy of all food ingredients, sources and places of origin

As the food industry is increasingly invaded by junk science (GMOs, anyone?), efforts will increase to hide all the chemical ingredients in food products and rename dangerous-sounding chemicals into nice-sounding chemicals.

The Corn Refiners Association is already trying to rename “High Fructose Corn Syrup” to “corn sugar.” (http://www.naturalnews.com/029748_h…) Aspartame is now going to be called “AminoSweet,” and MSG has been renamed things like “yeast extract” or “Torula yeast powder.”

But it’s going to get far worse as fraudulent science accelerates food industry deceptions. Expect to see preservatives like “sodium benzoate” renamed as things like, “Freshiness crystals.” Or “artificial colors” might be described as “Fortified with pretty colors.”

Above all, the food industry wants to hide where its foods come from, how they are made, and what’s in them, because all three of those categories are bad news for your health.

#5) The complete criminalization of home-produced foods and medicines, forcing total reliance on factory food production

Speaking of food, corrupt “scientists” will soon insist that growing your own food is extremely dangerous because you might grow e.coli in your garden! With such absurd justifications, home gardening will be completely outlawed in many towns, and those who try to secretly grow tomatoes will be arrested and imprisoned as if they were heroin smugglers.

The idea of all this is to make the population completely dependent on centralized factory food production, in the same way the population is currently dependent on centralized electricity and centralized fossil fuels. This will all be justified with the help of “scientists” who claim that factory-produced food is safer for you because it’s all pasteurized, irradiated and fumigated.

#6) The unleashing of a global bioweapon pandemic through seasonal flu shots

Whereas vaccines were once intended to prevent disease, they are now being increasingly weaponized and engineered to spread disease, which is why most of the people who get the flu each winter are the very same people who routinely take flu shots.

In the near future, as the globalists decide the world population has reached its upper tolerable limit, a live “population control” virus will be engineered right into the vaccines, followed by an aggressive vaccine push that even offers to pay people to receive flu shots. (Get a flu shot, earn $25!)

The whole scheme, of course, is nothing more than a population control measure designed to eliminate all the lower-IQ people on the planet who are stupid enough to allow themselves to be injected with biological weapons packaged and sold as vaccines. Effectively, it’s really a eugenics program that the globalists believe will save the human race from the rise of stupidity (no matter what the cost in human suffering).

#7) Total government control over your reproduction and the genetic code of your “offspring”

Copulating with the person of your choice and producing your own “random” offspring will no longer be allowed under the scientific police state. Reproduction must be carefully controlled through licensing and regulation to make sure that no unexpected results occur.

Before having children, parents will need to apply to the government for permission to reproduce, at which point they will be genetically and cognitively profiled, then granted a reproduction classification status that must be strictly followed to avoid imprisonment.

People who show rebellious tendencies and speak out against the state will be denied reproduction “privileges.” Only the most obedient, white-skinned, do-gooder mind slaves will be granted reproduction privileges, and they will gladly copulate and raise yet more babies to be sacrificed to the state as the next generation of mind slaves.

#8) Wireless brain implants that can be remotely activated by law enforcement to make entire crowds of people passive

The future of “science” involves all sorts of electronics implanted into the human body. One of the most convenient ones will be the “pacification chip” that will be forced upon citizens along with “money chips” that they use to pay for everything (cash will be outlawed, and using cash will be seen as a terrorist activity).

The pacification chip can be remotely activated by the government through cell tower bursts – or through hand-held units issued to police and law enforcement commanders – to instantly pacify large crowds of protesters or rioters. Are the students protesting about free speech again? Activate the pacification chip, and they’ll all lay down on the lawn and daydream for a while.

Are revolutionaries marching on the capitol and trying to overthrow the government? Activate the pacification chip, and your tyrannical dictatorship is safe!

Such chips may also be used to “excite” the brain at times when it is also politically useful. For example, when another terrorist attack is staged on U.S. soil, the “excitation chips” can be activated across the population to get people riled up and calling for war! (And that’s the whole point of false flag attacks, of course.)

In the mean time, the most powerful nations of the world will pour R&D money into growing genetically modified super soldiers who are secretly birthed, raised and trained to be as robotic as possible. These super soldiers will be genetically engineered with peak performance attributes (high blood oxygenation, large body frames, etc.) combined with small brains that can only process enough information to follow orders but never question them.

They will also be outfitted with numerous electronic implants, making them more cyborg than human. They will have vision implants attached to their retinas, for example, GPS chips wired to their brains, comm equipment wired into their ears, and built-in pain medication dispensers that flood their bodies with stimulant chemicals so they can keep fighting even after an arm gets blown off, for example.

#10) The electromagnetic activation of metals and nano-crystals injected into you through vaccines

Here’s a new one most people haven’t thought about: In addition to vaccines being used to spread infectious disease, they can also be used to inject humans with nano-crystals that are sized and tuned to resonate at certain frequencies, much like a radio crystal tunes in to a specific radio band.

Such nano-crystals may lie dormant in the bodies of the general public for years or even decades, but at some point the government can take over the radio towers with an “emergency” national transmission that broadcasts an activation signal at precisely the right wavelength to excite the nano-crystals already in peoples’ bodies. The results could be anything from mass insanity to massive outbreaks of violence (rioting, etc.) or just tens of millions of people instantly dropping dead. Any of those outcomes could then be exploited by the government to sell a cover story of a “terrorist attack” that requires even more government control over the population.

It could all be done in the name of “science”

Remember, this collection of 10 points is about possible future technologies that exemplify the abuse of science to empower tyrannical governments and corrupt industries. Thankfully, these ten examples have not come true yet, but several are well on their way to become reality in just the next few years.

Real science has an important role to play in any society, but I believe that science should serve the interests of the People, not the self-serving controllers who run globalist corporations and national governments. When science is used to dominate and enslave people rather than setting them free, it is a violation of one of the most fundamental truths throughout the universe: only through freedom (the freedom of ideas, freedom of questioning, freedom of discussion) can true understanding of our universe be achieved.

NaturalNews salutes the real scientists out there who pursue the betterment of human civilization without punching a clock for all the evil corporations which abuse science for their own nefarious purposes.

]]>http://www.thetruthseeker.co.uk/?feed=rss2&p=383590Big Brother 2.0: 10 New Ways That The Government Will Be Spying On You And Controlling Your Behaviorhttp://www.thetruthseeker.co.uk/?p=32297
http://www.thetruthseeker.co.uk/?p=32297#commentsWed, 17 Aug 2011 08:08:28 +0000http://www.thetruthseeker.co.uk/?p=32297End of the American Dream – August 15, 2011

Are you ready for Big Brother 2.0? If you think that the hundreds of ways that the government watches, monitors, tracks and controls us now are bad, just wait until you see what is coming. We live in an age when paranoia is running wild. As technology continues to develop at an exponential pace, governments all over the globe are going to discover a multitude of new ways to spy on us and control our behavior. In a world where everyone is a “potential terrorist”, we are told that things like liberty, freedom and privacy are “luxuries” that we can no longer afford. We are assured that if we just allow the government to watch all of us and investigate all of us that somehow that will keep us all safe. But it isn’t just the government that is watching us. Now we are being taught to spy on one another and to report any trace of “suspicious activity” to the government immediately. The entire civilized world is being transformed into one giant prison grid, and many of the new technologies that are now being introduced are going to make things even worse.

The following are 10 new ways that the government will be spying on you and controlling your behavior….

#1 Are you ready for “electronic skin tattoos”? One team of researchers has created an extremely thin, extremely flexible “smart skin” that will open up a whole new world of possibilities. Wearing “skin-mounted electronics” might seem like a great idea to tech geeks, but it also could create a whole lot of new problems. The following is how an article in one UK newspaperdescribed this new breakthrough….

The “epidermal electronic system” relies on a highly flexible electrical circuit composed of snake-like conducting channels that can bend and stretch without affecting performance. The circuit is about the size of a postage stamp, is thinner than a human hair and sticks to the skin by natural electrostatic forces rather than glue.

Yes, this kind of technology would be a great way to connect wirelessly to the Internet and it would be helpful for doctors that need to monitor their patients, but the potential for abuse is also there.

Once this type of technology becomes widespread, governments will be able to monitor the location and activities of their citizens like never before.

In addition, this type of technology could one day become mandated by governments. For example, someday you may be required to have an “electronic skin tatoo” in order to prove your identity or to participate in commerce.

Also, it is not too far of a stretch to imagine that “skin-mounted electronics” could be used to control large populations. Just remember, if you connect yourself physically to the Internet, that also means that the Internet is connected to you.

#2 According to a shocking document obtained by Oath Keepers, the FBI is now instructing store owners to report many new forms of “suspicious activity” to them. According to the document, “suspicious activity” now includes….

-paying with cash

-missing a hand or fingers

-“strange odors”

-making “extreme religious statements”

-“radical theology”

-purchasing weatherproofed ammunition or match containers

-purchasing meals ready to eat

-purchasing night vision devices, night flashlights or gas masks

According to WorldNetDaily, this document is part of a “series of brochures” that will be distributed “to farm supply stores, gun shops, military surplus stores and even hotels and motels.”

#3 The U.S. military has developed an invisible “pain ray” that is remarkably effective. The following is how a recent article posted on Alternetdescribed this weapon….

It sounds like a weapon out of Star Wars. The Active Denial System, or ADS, works like an open-air microwave oven, projecting a focused beam of electromagnetic radiation to heat the skin of its targets to 130 degrees. This creates an intolerable burning sensation forcing those in its path to instinctively flee (a response the Air Force dubs the “goodbye effect“).

#4 Be careful about what you put up on Facebook or Twitter. Law enforcement agencies all over the globe are now focusing on social media as never before. For example, the NYPD has just createda special “social media” unitdedicated to looking for criminals on Facebook and Twitter.

#5 Facial recognition technology has now come of age. With the millions of security cameras that are going up all over the world, such technology is proving to be very useful for law enforcement authorities. In fact, police in London are using it to track down people that were involved in the London riots. The following is an excerpt from a recent CBC reportthat described these efforts….

Facial recognition technology being considered for London’s 2012 Games is getting a workout in the wake of Britain’s riots, with officers feeding photographs of suspects through Scotland Yard’s newly updated face-matching program.

Facial recognition technology is rapidly going to become part of our everyday lives. In fact, now even Facebook is using it. Eventually it is going to become very difficult to avoid the reach of this technology.

#6 “Smart meters” are going into homes all over North America and Europe. These smart meters monitor your home every single minute of every single day and they transmit very sophisticated data about your personal behavior back to the utility company.

They are already being usedby police all over the United States in drug cases. If a smart meter catches you using an “unusual” amount of energy there is a good chance that your home will be raided.

The European Parliament has set a goal of having smart meters in the homes of80 percentof all electricity consumers by the year 2020, and Barack Obama is working very hard to get them into as many American homes as he can.

#7 Our children are being trained to accept being under surveillance almost constantly. For example, the U.S. Department of Agriculture is spending huge amounts of money to install surveillance camerasin the cafeterias of U.S. public schools so that government control freaks can closely monitor what our children are eating.

#8 Perhaps you thought that only Tom Cruise had to worry about “pre-crime”. Well, now “pre-crime” is popping up in the real world too. The Florida State Department of Juvenile Justice has announced that it will begin using analysis software to predict crime by young delinquentsand will place “potential offenders” in specific prevention and education programs.

#9 According to the ACLU, state police in Michigan are now using “extraction devices” to download data from the cellphones of motorists that they pull over. This is taking place even if those pulled over are not accused of doing anything wrong.

The following is how an article on CNET Newsdescribed the capabilities of these “extraction devices”….

The devices, sold by a company called Cellebrite, can download text messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to work with different models and can even bypass security passwords and access some information.

#10 LRAD sound cannons are already been used by law enforcement authorities to disperse large crowds inside the United States. So how much “damage” can sound do? Well, it turns out that sound can actually do a whole lot of damage. The following is how Alternetdescribes these cruel weapons….

TheLong Range Acoustic Device, or LRAD, built by American Technology Corporation, focuses and broadcasts sound over ranges of up to hundreds of yards. LRAD has been around for years, but Americans first took notice when police used it in Pittsburgh to ward off protesters at the 2009 G-20 summit. It is generally used in two ways: as a megaphone to order protesters to disperse; or, if they disobey, as an “ear-splitting siren” to drive them away. While LRAD may not be deadly, itcan permanently damage hearing, depending on how it’s used.

LRAD sound cannons do not discriminate. When they are being used to disperse protesters, any innocent bystanders in the area will be affected as well. If anyone gets too close to an LRAD sound cannon while it is in use, permanent damage can result. Small children and the elderly are particularly vulnerable. Sadly, the use of LRAD sound cannons is becoming more common. In fact, they have even been used to break up college block parties.

So is this the kind of world that you want to live in?

Do you want your children and grandchildren to live in a world where liberty and freedom are all but forgotten?

This world is headed toward a very dark place. These “Big Brother” technologies are going to become even more pervasive and even more oppressive. If this trend is not stopped now, someday these technologies will get into some very evil hands, and then all hell will be unleashed.

IF YOU use an Apple iPhone or iPad, it is highly possible that you could be tracked almost anywhere in the world – and without your knowledge too.

Two security researchers have discovered a simple way to map out where you’ve been using information from a location cache file found within your iPhone’s backups on your Mac or PC.

Because the files are not encrypted, it brings about serious privacy concerns and opens the door to physical and cyber security threat.

In a published article in Ars Technica, researchers Alasdair Allan and Pete Warden revealed their findings on Wednesday ahead of a conference taking place in San Francisco.

They found out that the iPhone or 3G iPad, or any Apple product with 3G data access, are logging location data to a file called consolidated.db with latitude and longitude coordinates and a timestamp.

This data collection appears to be associated with the launch of iOS 4 last June and what this means is that Apple users have almost a year’s worth of location data collected.

In order to prove their discovery, the two researchers developed an open source application called iPhone Tracker to let anyone with access to the computer of the 3G device’s user to track the locations he or she has been to.

The software managed to track all of the countries they visited while using the iPhone.

Their findings also showed that Apple uses the Global Positioning System (GPS) to track locations and it makes sure that the user is notified every time an app is used to grab a GPS location.

However, that’s not all. Apple also triangulates the location from mobile phone towers and logs that information in order to help get a faster GPS lock.

This method does not go through the “approval” step required from the user when he fires up an app that uses GPS, so users do not get to decide whether their locations are tracked or not.

This tracking technology is not new and mobile companies have been using this information for their own purposes for years.

In the United Staes, regular people cannot access that data and a court order must be obtained.

However, with the method Apple is using, the data can be accessed from any computer which is used to sync the iPhone or iPad, as the information is not encrypted.

This means that anyone can have a detailed picture of your whereabouts but not without having to snoop at your computer.

Security expert Mr Charlie Miller told Ars: “This file is only readable by root. That means that a rogue App Store app won’t be able to read it. Even a bad guy who hacks into your browser won’t be able to read it.”

However, it is still possible for remote hackers to exploit the data and it seems that there is no fix for now, wrote Mr Sam Biddle at Gizmodo.

“The only way to remove it from your computer is to wipe your back up files from your computer. But then you have no back ups to restore your phone in case you lose it.

“And every time you sync your computer, though, it’ll create a new file. And if you do lose your phone, all your tracking data goes with it, right into the hands of whoever found it. And if you upgrade your phone to the next iPhone, the location tracking data goes with it,” said Mr Biddle.

In ancient times, Gorgon was a mythical Greek creature whose unblinking eyes turned to stone those who beheld them. In modern times, Gorgon may be one of the military’s most valuable new tools.

This winter, the Air Force is set to deploy to Afghanistan what it says is a revolutionary airborne surveillance system called Gorgon Stare, which will be able to transmit live video images of physical movement across an entire town.

The system, made up of nine video cameras mounted on a remotely piloted aircraft, can transmit live images to soldiers on the ground or to analysts tracking enemy movements. It can send up to 65 different images to different users; by contrast, Air Force drones today shoot video from a single camera over a “soda straw” area the size of a building or two.

With the new tool, analysts will no longer have to guess where to point the camera, said Maj. Gen. James O. Poss, the Air Force’s assistant deputy chief of staff for intelligence, surveillance and reconnaissance. “Gorgon Stare will be looking at a whole city, so there will be no way for the adversary to know what we’re looking at, and we can see everything.”

Questions persist, however, about whether the military has the capability to sift through huge quantities of imagery quickly enough to convey useful data to troops in the field.

Officials also acknowledge that Gorgon Stare is of limited value unless they can match it with improved human intelligence – eyewitness reports of who is doing what on the ground.

The Air Force is exponentially increasing surveillance across Afghanistan. The monthly number of unmanned and manned aircraft surveillance sorties has more than doubled since last January, and quadrupled since the beginning of 2009.

Indeed, officials say, they cannot keep pace with the demand.

“I have yet to go a week in my job here without having a request for more Air Force surveillance out there,” Poss said.

But adding Gorgon Stare will also generate oceans of more data to process.

The development of Gorgon Stare began about 18 months ago. It is based on the work of Air Force scientists who came up with the idea of stitching together views from multiple cameras shooting two frames per second at half-meter resolution. Currently full-motion video is shot at 30 frames per second from one camera mounted on a Predator or the larger Reaper drone. That makes for more fluid video, but also more difficulty in assembling frames quickly to get the wide-area view.

Technological advances now make it possible for a soldier on the ground to receive any portion of a panoramic view in real time, streamed to a portable device about the size of an iPad, Poss said. At the same time, nine other soldiers can get the same or a different view. The images will be stored so analysts can study them to determine, for instance, who planted an improvised bomb or what the patterns of life in a village are.

The Air Force has also taken tips from the purveyors of pop culture. It is working with Harris Corp. to adapt ESPN’s technique of tagging key moments in National Football League videotape to the war zone. Just as a sportscaster can call up a series of archived quarterback blitzes as soon as a player is sacked on the field, an analyst in Afghanistan can retrieve the last month’s worth of bombings in a particular stretch of road with the push of a button, officials said.

The Air Force placed a contractor on the set of a reality TV show to learn how to pick out the interesting scenes shot from cameras simultaneously recording the action in a house. And taking a page from high-tech companies such as Google, the Air Force will store its reams of video on servers placed in used shipping containers in Iowa.

The Air Force is looking to mount wide-area surveillance cameras on airships that can stay aloft for up to two weeks.

“This is all cutting-edge technology that is being fielded in a short period of time,” said retired Lt. Gen. David A. Deptula, who served as deputy chief of staff for intelligence, surveillance and reconnaissance.

“If you look into the not-too-distant future, what these technologies will allow us to do is remove more and more ground forces and replace them with sensors where we normally would have to rely on people going somewhere to find something out,” he said.

But other military officials caution that a counterinsurgency requires an understanding of the local population.

“That really only comes from human intelligence or boots on the ground,” said Army Col. Steven A. Beckman, the former intelligence chief for coalition forces in Kandahar in southern Afghanistan.

“We can get the 3-D geo-intelligence that tells us what every building, what every street looks like in Marja,” he said at the U.S. Geospatial Intelligence Foundation conference in New Orleans in November. But such intelligence needs to be “underpinned by a degree of local knowledge . . . to enable us to maximize that.”

Beckman called full-motion video “the crack cocaine of our ground forces” – but often, he said, it’s a technology that is poorly utilized.

He noted in an interview that he is an advocate of the technology but that in some cases, other tools might be a better solution for a commander’s needs.

Marine Capt. Matt Pottinger, who collaborated on “Fixing Intel,” an official critique of the intelligence effort in Afghanistan issued a year ago, said he found a disconnect between the intelligence requests for aerial surveillance issued by commanders in regional headquarters and the needs of the soldiers or Marines at the platoon level.

“Often what the guys need it for is not to stare at some highway for five hours because they want to drop a bomb on some guy they see coming out to dig a hole in the ground to plant an IED,” he said. “Oftentimes, the questions that the soldiers and Marines need answered are ‘Where’s the traffic? Where are the cars going? Are they actually using this strip of desert or completely bypassing this district?’ “

Pottinger, a visiting fellow at the Council on Foreign Relations, said analysts in regional headquarters should meet with troops in the field to understand their needs, otherwise all the “whiz-bang” gear will never be used to its full potential.

Gorgon Stare is being tested now, and officials hope it will be fielded within two months. Each $17.5 million pod weighs 1,100 pounds and, because of its configuration, will not be mounted with weapons on Reaper aircraft, officials said. They envision it will have civilian applications, including securing borders and aiding in natural disasters. The Department of Homeland Security is exploring the technology’s potential, an industry official said.

Poss said he would “never denigrate the need for good, solid human intelligence because even watching an entire city means nothing unless you can put context to it.”

But, he said, “being able to watch an entire city, I’m convinced, is going to have a huge impact on operations in the war zone.”

Microchips in pills could soon allow doctors to find out whether a patient has taken their medication.

The digestible sensors, just 1mm wide, would mean GPs and surgeons could monitor patients outside the hospital or surgery.

Developers say the technology could be particularly useful for psychiatric or elderly patients who rely on a complicated regime of drugs – and are at risk if they miss a dose or take it at the wrong time.

It could also be used for the chronically ill, such as people with heart disease, to establish whether costly drugs are working or whether they are causing potentially dangerous side effects.

The sensors could even remind women to take the Pill if they forget.

The ‘intelligent’ medicine works by activating a harmless electric charge when drugs are digested by the stomach.

This charge is picked up by a sensing patch on the patients’ stomach or back, which records the time and date that the pill is digested. It also measures heart rate, motion and breathing patterns.

The information is transmitted to a patient’s mobile phone and then to the internet using wireless technology, to give a complete picture of their health and the impact of their drugs.

Doctors and carers can view this information on secure web pages or have the information sent to their mobile phones.

The silicon microchips are invisible to patients and can be added to any standard drug during the manufacturing process.

Two major drugs companies are investigating the technology, developed by US-based Proteus Biomedical. Trials are to begin in the UK within 12 months.

Professor Nick Peters, a cardiologist at Imperial College London, who is co-ordinating trials, said the technology was ‘transformative’.

‘This is all about empowering patients and their families because it measures wellness, and people can actually be tracked getting better,’ he said.

‘Normally patients would have to be in hospital to get this level of feedback, so the hope is that it frees up beds and saves the NHS money.’http://www.dailymail.co.uk/health/article-1169305/Microchip-tells-GP-8217-ve-taken-pills.html

]]>http://www.thetruthseeker.co.uk/?feed=rss2&p=106310Does what happens in the Facebook stay in the Facebook?http://www.thetruthseeker.co.uk/?p=7101
http://www.thetruthseeker.co.uk/?p=7101#commentsMon, 23 Mar 2009 00:00:00 +0000Interesting and revealing presentation to found here.
]]>http://www.thetruthseeker.co.uk/?feed=rss2&p=71010Government will spy on every call and e-mailhttp://www.thetruthseeker.co.uk/?p=9559
http://www.thetruthseeker.co.uk/?p=9559#commentsWed, 08 Oct 2008 00:00:00 +0000David Leppard – Times Online October 5, 2008

Ministers are considering spending up to £12 billion on a database to monitor and store the internet browsing habits, e-mail and telephone records of everyone in Britain.

GCHQ, the government’s eavesdropping centre, has already been given up to £1 billion to finance the first stage of the project.

Hundreds of clandestine probes will be installed to monitor customers live on two of the country’s biggest internet and mobile phone providers – thought to be BT and Vodafone. BT has nearly 5m internet customers.

Ministers are braced for a backlash similar to the one caused by their ID cards programme. Dominic Grieve, the shadow home secretary, said: “Any suggestion of the government using existing powers to intercept communications data without public discussion is going to sound extremely sinister.”

MI5 currently conducts limited e-mail and website intercepts which are approved under specific warrants by the home secretary.

Further details of the new plan will be unveiled next month in the Queen’s speech.

The Home Office stressed no formal decision had been taken but sources said officials had made clear that ministers had agreed “in principle” to the programme.

Officials claim live monitoring is necessary to fight terrorism and crime. However, critics question whether such a vast system can be kept secure. A total of 57 billion text messages were sent in the UK last year – 1,800 every second.http://www.timesonline.co.uk/tol/news/uk/article4882600.ece

Tens of thousands of Britons are being covertly tracked without their consent in a technology experiment which has installed scanners at secret locations in offices, campuses, streets and pubs to pinpoint people’s whereabouts.

The scanners, the first 10 of which were installed in Bath three years ago, are capturing Bluetooth radio signals transmitted from devices such as mobile phones, laptops and digital cameras, and using the data to follow unwitting targets without their permission.

The data is being used in a project called Cityware to study how people move around cities. But pedestrians are not being told that the devices they carry around in their pockets and handbags could be providing a permanent record of their journeys, which is then stored on a central database.

The Bath University researchers behind the project claim their scanners do not have access to the identity of the people tracked.

Eamonn O’Neill, Cityware’s director, said: “The objective is not to track individuals, whether by Bluetooth or any other means. We are interested in the aggregate behaviour of city dwellers as a whole. The notion that any agency would seriously consider Bluetooth scanning as a surveillance technique is ludicrous.”

But privacy experts disagree, pointing out that Bluetooth signals are assigned code names that can, to varying degrees, indicate a person’s identity.

Many people use pseudonyms, nicknames, initials, or abbreviations to identify their Bluetooth signals. Cityware’s scanners are also picking up signals that are listed using people’s full name, email address and telephone numbers.
Contacted about the Cityware project, the office of the information commissioner said in a statement that the public should “think carefully” before switching on their Bluetooth signals. A spokesman said the government watchdog would “monitor” the experiment.

“This is yet another example of moronic use of technology,” said Simon Davies, director of Privacy International, an independent campaigning group defending personal privacy. “For Bath University to assert that there aren’t privacy implications demonstrates an astonishing disregard for consumer rights. If the technology is as safe as they claim, then all the technical specifications should be published and people should be informed when they are being tracked.”

He added: “This technology could well become the CCTV of the mobile industry. It would not take much adjustment to make this system a ubiquitous surveillance infrastructure over which we have no control.”

Although initially confined to Bath, Cityware has spread across the planet after the software was made freely available on the internet sites Facebook and Second Life. Thousands of people downloaded the software to equip their home and office computers with Cityware scanners.

More than 1,000 scanners across the world at any time detect passing Bluetooth signals and send the data to Cityware’s central database. Those with access to the database admit they do not know precisely how many scanners have been created, but there are known to be scanners in San Diego, Hong Kong, Australia, Singapore, Toronto and Berlin.

In Bath alone scanners are tracking as many as 3,000 Bluetooth devices every weekend. One recent study used the scanners to monitor the movements of 10,000 people in the city.

About 250,000 owners of Bluetooth devices, mostly mobile phones, have been spotted by Cityware scanners worldwide.

O’Neill, who described his project as “public observation” rather than surveillance, said the data would improve scientific understanding of the privacy and security threats posed by Bluetooth technology. A “potentially immensely valuable side-effect”, he added, was that data about people’s movements could help research into the spread of biological epidemics.

“Just as we continue to research forms of defence against other more traditional threats, we must research forms of defence against new digital threats,” he said, adding that the database eventually would be destroyed.

However Vassilis Kostakos, a former member of Cityware who now does Bluetooth experiments on buses in Portugal for the University of Madeira, accepted such tracking was a problem.

“We are actually trying to fix this,” Kostakos said. “If a person’s phone is talking to a scanner, then they should be told about it. Any technology can have good and bad consequences. In many ways, I think the role of a scientist is to point out both. I agree this is complex and I agree there are harmful scenarios.”

The technique has echoes of the thriller Enemy of the State in which the character played by Will Smith is followed by satellite surveillance.

Kostakos said he could foresee complex ways in which criminals could exploit the technology, adding: “I recently tried to look at people’s travel patterns across the world, and we [saw] how a unique device which showed up in San Francisco turned up in Caracas and then Paris.”

Bluetooth tracking technology is already being used to aim advertisements at people, for example as they walk past shops or billboards.

Bluetoothtracking.org, a website based in the Netherlands, is using the same technology to publish live data about people’s movements across the town of Apeldoorn. The facility allows people to search the whereabouts of friends and associates without them knowing about it.

Some scientists using the technology describe a future scenario in which homes and cars adapt services to suit their owners, automatically dimming lights, preparing food and selecting preferred television channels.http://www4.u.tv/news/NationalNews/index.asp?id=121364&sel2=2&sel=1&local=0

‘Think for yourself and question authority.”~Timothy Leary (1920 – 1996)
American writer, psychologist, futurist and icon of psychedelic drug research and use.

I hate to be the bogeyman or bearer of bad news in many of my essays, but listen-up: In this authoritarian driven 21st century so full of numerous Orwellian creations, a long developed scientific control tactic may soon be realized in our lifetime in order to steal everyone’s personal freedom. Yes, the powers that be want to implant tiny little microchips into our bodies for surveillance purposes, behavior manipulation, and more…

For me, just the thought of this intrusive Machiavelli scheme is comparable to having a bad hallucinogenic acid trip. In fact, I consider this whole chip-trip more dangerous than taking a massive overdose of LSD, then wildly running down the middle of a busy expressway at rush hour in a major metropolitan city. Indeed, I’m sure Timothy Leary would greatly appreciate me quoting him on this one! And I’m equally sure if he were alive today, he would offer ‘something snappy’ to counter this hideous idea of chipping everyone up. He once said ‘Science is all Metaphor.’ How ironic and often true. But Leary is best known for coining the phrase, ‘turn-on, tune-in, drop-out.’ However, after learning about this electronic assault on technology, I’m sure he would probably offer the following sober advise — turn-me-over, tune your lips on-my-ass and drop-dead? Indeed, I’d bet my sanity on that one.

The idea of controlling the world populace through new and improved scientific electronic control technology has been up-graded for decades. It’s an on-going sadistic dream birthed in the belly of old CIA programs such as Dr. Jose Delgado’s MKULTRA project group. The goal is simple, the powerful elites want to find a better, easier, more efficient way to control everyone at will with fewer jackboots in the streets.

Quickly now, pinch me hard and fast. And, if I should die before I wake, please send my ashes into space on a jet plane just like Timothy Leary did so many years ago. Because I too, may soon want to escape my earthly bounds as well. I may soon think this ominous planet earth is not worthy of the experience. I am not a ‘chip’ off the old puppet-block for Xx*!-heads to pull my strings at will.

Believe it or not, this reality is now reaching a critical juncture for totally wiping out the freedom we have known and enjoyed for 232 years. Bottom line, this new technology promises to usher in a new era of modern day slavery — in the extreme. A lowly, monstrous prodigy that could stream for generations.

Ostensibly, manipulative electronic implants are for real. And these new chips are ready to be unknowingly injected into the public bloodstream through the end of any hypodermic needle. Lets entertain the possibility that a massive vaccination program may soon be announced at a clinic near you where everyone will be required to receive a mandatory immunization shot in the name of ‘public safety.’ Although this scheme was cloaked in secrecy behind closed doors, Homeland Security (and FEMA) already have executive orders in place to quickly implement this microchip program into reality upon a minute’s notification. Conspiracy theory? Think again…

What are these microchips all about you say? Well, these crazy scientists have developed this insane technology far beyond the confines of simple GPS-tracking ability via satellite. In fact, they have made great leaps and bounds in the area of ‘neuroscience.’ Get ready to pop your cork — the experimental monkey is on our back now.

In addition to having the ability to easily track anyone’s whereabouts on the globe (just like our current passports and money), they can now monitor and/or regulate our physical and emotional state in real human form. Thus, once the chip is in, they will be able to manipulate us at will using either remote electronic signaling, or by relying on the chip’s pre-integrated software program. Sort of like loading a disk directly into a computer hard drive, only this is us, not computers.

Scary stuff! Yes, they can now sufficiently alter our natural emotional functions, nervous system and genetic, or ligand-receptor, networks, in order to manage desirable or undesirable behavior, thought processes and even motor skills. In essence, they can change the way our body metabolizes serotonin. Unreal? Think again, It’s limitless, including ‘death,’ with a mere push of a button if they so desire. How convenient, they can now inject miniature hit-men into our bodies.

Let me explain this further. In terms of body function, serotonin can affect the heart, muscles and various elements of the endocrine system, or hormones and glands. I’m trying to keep this as simple as I can, but our body chemistry is very complex; it contains many different hormones, neurotransmitters, and other substances influencing how we think, feel and act. I want you to consider the ramifications of anyone having the ability to affect any of these changes inside our body…yeah, I know, this sounds like some fucking crazy X-File stuff, straight out of Chris Carter’s imagination. But this is for real…it is not fiction.

After considering where we are in today’s grand global scheme of things, is it really that hard to believe? The elites have been moving mountains for decades in order to globalize the planet under one monetary banner. A one-world government using all populations as a cheap docile workforce to further their wants and needs. Ideas such as this only realize that goal even quicker and more efficiently. Yes, a lot of time, money and resources went into this project.

What better way to destroy independent thought and free will (and lives) than to kill it inside our bodies before it can begin? How hard can it be for them to control us once the chips are implanted? My God, this is the ultimate form of absolute control without tarnishing a bit of landscape. Atomic weapons and most conventional warfare could be a thing of the past in the near future. Why pollute and destroy industrial factories, critical infrastructure, agriculture fields, small towns or major cities when they can steal lives, control our thoughts, manipulate our body functions and harness the slave matrix without firing a single shot? Now this is control!

In ending, I have given you just enough information about this subject to inspire you to do more research on your own. Naturally, I could be lying. I don’t expect you to take my word for it. I want you to find your own answers. Only then, will you realize the full gravity of our situation. The truth has always been out there, you just need to find it — and then act accordingly. The horrible technology is here, the only question is — how much persuading will be necessary to make us obediently — even gleefully — accept it?

One thing is certain — this will move forward in the name of national security and public safety. I used to believe it would happen slowly, step by step. But now, I think it’s going to be escalated soon. Perhaps, as quickly as mid 2009. Remember this well — if this is allowed to happen, we will be led into a place where no one, if they thought about it, would ever willingly go. Once we have crossed that line — there will be no means to escape this madness…

Vincent L Guarisco is a freelance writer from Bullhead City AZ., a contributing writer for many web sites, and a lifetime founding member of the Alliance of Atomic Veterans. Reprint permission is given as long as article content is not altered or changed and credit is given to the author. The 21st century, once so full of shining promise, now threatens to force countless millions of us at home and abroad into a dark abyss of languishing poverty and silent servitude; a lowly prodigy of painful struggle and suffering that could stream for generations to come. I’m wishing for a miracle, before it is too late, the masses will figure it out and will stand as one and roar. So, pass the word — it’s past time to take back what is ours — the American Dream where the pursuit of happiness, the ability to live in a free and peaceful nation is a reality. We bought it, and we paid for it. It’s time to take it back. For replies, contact: vincespainting1@hotmail.com

Motorola is the company producing the microchip for the MONDEX SMARTCARD.

More than 250 corporations and 20 countries are involved in the distribution of MONDEX to the world and many nations are “privileged” to use this system, among them: Great Britain, Canada, U.S.A., Australia, New Zealand, Israel, Hong Kong, China, Indonesia, Macau, Malaysia, Philippines, Singapore, Thailand, India, Taiwan, Sri Lanka, Costa Rica, Guatemala, Nicaragua, Panama, Honduras, El Salvadore and Brazil.

They have developed several implants for humans using the “Bio-chip”.

The “bio-chip” measures 7mm in length and is .075mm wide, about the same size as a grain of rice. It contains a transponder and a rechargeable Lithium battery. A thermocouple circuit that produces an electrical current with the fluctuation of body temperature recharges the battery.

MONDEX spent more than $1.5 million dollars in research just to find the best place to insert the “Bio-chip” into the human body. They found only two satisfactory and efficient places – THE HEAD, underneath the scalp and the backside of the hand specifically … THE RIGHT HAND!

Revelation 13:16, 17

(v16) He causes all, both great and small, rich and poor, free and slave, to receive a mark on their right hand or on their foreheads, (v.17) and that no one may buy or sell except one who has the mark or the name of the beast, or the number of his name.
Revelation 13:16,17

How much of a coincidence is that?

One billion “bio-chips” are being produced by MONDEX a year. Its been in production for at least a year.

They discovered that if the chip were in a card, they would encounter serious problems. The chip could be cut and information changed or falsified. The value could be manipulated, stolen or lost. After you receive the card it will expire in one to two years.

In the end real money will be insecure in the general market.

There is only one solution for this problem, embraced by MOTOROLA … implanting the “biochip” in the right hand or head, where it cannot be removed. If it is removed by surgery, the small capsule will burst and the Lithium and chemicals in the microchip would contaminate the individual.

Moreover, the Global Positioning System (GPS) will detect if it was removed and alert the authorities.